Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2023 01:45

General

  • Target

    41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532.exe

  • Size

    977KB

  • MD5

    86226298f5f7c878323137119929a4c1

  • SHA1

    83db798ff6aee97864c18827749a3f1c5cbc4c51

  • SHA256

    41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532

  • SHA512

    577249a3ea902b1f9615d2b98d3d2ed051d8dc6f286c42641cb1530183dc70afa529bc72a0214dec04f1ae5c270fb5b4f8dfa84fea887a5b5a6faa5a979b961d

  • SSDEEP

    24576:TNmsC6pxpjI6YZ6dDyFqQCtqckiY7Y5u:T5RpU9ZSWFqrjkiK5

Malware Config

Extracted

Family

lumma

C2

82.117.255.80

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532.exe
    "C:\Users\Admin\AppData\Local\Temp\41ae7c8a95a5367900997394091ab6fb70b83157906df1c95f7dddf124a07532.exe"
    1⤵
      PID:2028

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2028-54-0x0000000000290000-0x0000000000340000-memory.dmp
      Filesize

      704KB

    • memory/2028-55-0x0000000001FF0000-0x0000000002105000-memory.dmp
      Filesize

      1.1MB

    • memory/2028-56-0x0000000000400000-0x00000000007B7000-memory.dmp
      Filesize

      3.7MB

    • memory/2028-57-0x0000000000400000-0x00000000007B7000-memory.dmp
      Filesize

      3.7MB

    • memory/2028-58-0x0000000000400000-0x00000000007B7000-memory.dmp
      Filesize

      3.7MB